Are there techniques or methods to develop security protocols without side channel attacks?

In general timing attacks are a manifestation of the implementation. So if I am processing data on the server or the client then I can leak information depending on how the code is written.

To prevent such vulnerabilities, … Continue reading Are there techniques or methods to develop security protocols without side channel attacks?

Secret Santa implementation that does not require a participant to trust the server

In the Christmas spirit I read Cryptographic Secret Santa from MathOverflow, and then followed the link to another page titled Cryptographic Secret Santa.

On this latter page the author explains an algorithm he would use to assign Secret … Continue reading Secret Santa implementation that does not require a participant to trust the server